Analysis
-
max time kernel
132s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 11:44
Static task
static1
Behavioral task
behavioral1
Sample
b354446f27096f68eb5e8fdfc628419e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b354446f27096f68eb5e8fdfc628419e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b354446f27096f68eb5e8fdfc628419e_JaffaCakes118.exe
-
Size
32KB
-
MD5
b354446f27096f68eb5e8fdfc628419e
-
SHA1
0775bf7f987fae85c9ec08c2872f931705828e1a
-
SHA256
57b8695d861d70b700b75f9e1a68069172051fa90b1e6cad6fb00eaee5b26222
-
SHA512
8d7af4d3cddd5f43a77dba045a3e3661353f455c0dfd506528e3a077ff2e1b5a2891754e982a27fca0af6ad9bbc46a786c857eb262938d08b9d1d1391c60d00c
-
SSDEEP
384:4YgAUDjUL9fvGt7Ma+lhsSJAmu1KymGa:4topgv+lhsShoKB
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Macromadendt\MsShellExt\fxdapta.ini b354446f27096f68eb5e8fdfc628419e_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b354446f27096f68eb5e8fdfc628419e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3240 b354446f27096f68eb5e8fdfc628419e_JaffaCakes118.exe 3240 b354446f27096f68eb5e8fdfc628419e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3240 wrote to memory of 1112 3240 b354446f27096f68eb5e8fdfc628419e_JaffaCakes118.exe 90 PID 3240 wrote to memory of 1112 3240 b354446f27096f68eb5e8fdfc628419e_JaffaCakes118.exe 90 PID 3240 wrote to memory of 1112 3240 b354446f27096f68eb5e8fdfc628419e_JaffaCakes118.exe 90 PID 1112 wrote to memory of 1428 1112 net.exe 92 PID 1112 wrote to memory of 1428 1112 net.exe 92 PID 1112 wrote to memory of 1428 1112 net.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\b354446f27096f68eb5e8fdfc628419e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b354446f27096f68eb5e8fdfc628419e_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\SysWOW64\net.exenet start mtsodfdss2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start mtsodfdss3⤵
- System Location Discovery: System Language Discovery
PID:1428
-
-